• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
vishing goes high tech: new 'letscall' malware employs voice traffic routing

Vishing Goes High-Tech: New ‘Letscall’ Malware Employs Voice Traffic Routing

You are here: Home / General Cyber Security News / Vishing Goes High-Tech: New ‘Letscall’ Malware Employs Voice Traffic Routing
July 7, 2023

Scientists have issued a warning about an rising and sophisticated form of voice phishing (vishing) recognized as “Letscall.” This system is at present focusing on men and women in South Korea.

The criminals at the rear of “Letscall” use a multi-step attack to deceive victims into downloading malicious applications from a counterfeit Google Enjoy Retailer web page.

The moment the destructive software is mounted, it redirects incoming calls to a call centre under the command of the criminals. Educated operators posing as financial institution employees then extract sensitive information from unsuspecting victims.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


To aid the routing of voice visitors, “Letscall” makes use of cutting-edge technologies these as voice about IP (VOIP) and WebRTC. It also can make use of Session Traversal Utilities for NAT (STUN) and Traversal Using Relays all-around NAT (Convert) protocols, which includes Google STUN servers, to be certain substantial-quality phone or online video phone calls and bypass NAT and firewall restrictions.

The “Letscall” group is composed of Android developers, designers, frontend and backend developers, as very well as get in touch with operators specializing in voice social engineering attacks.

The malware operates in 3 stages: to start with, a downloader app prepares the victim’s gadget, paving the way for the installation of potent spy ware. This spyware then triggers the ultimate phase, which permits the rerouting of incoming calls to the attackers’ simply call heart.

Voice Traffic Routing

“The third phase has its personal established of instructions, which also consists of Web socket instructions. Some of these instructions relate to the manipulation of the handle guide, these kinds of as building and eradicating contacts. Other instructions relate to producing, modifying, and eliminating the filters that identify which phone calls should be intercepted and which really should be dismissed,” Dutch cell security organization ThreatFabric claimed in its report.

What sets “Letscall” aside is its utilization of highly developed evasion procedures. The malware incorporates Tencent Legu and Bangcle (SecShell) obfuscation all through the first obtain. In afterwards levels, it employs sophisticated naming constructions in ZIP file directories and deliberately corrupts the manifest to confuse and bypass security systems.

Voice Traffic Routing

Criminals have created programs that instantly contact victims and engage in pre-recorded messages to more deceive them. By combining cellular phone bacterial infections with vishing approaches, these fraudsters can request micro-loans in the victims’ names though assuring them of suspicious things to do and redirecting phone calls to their facilities.

Approaching WEBINAR🔐 Privileged Access Administration: Study How to Conquer Critical Issues

Learn distinct techniques to conquer Privileged Account Administration (PAM) issues and stage up your privileged obtain security system.

Reserve Your Location

The effects of these types of attacks can be sizeable, leaving victims burdened with sizeable loans to repay. Economical establishments normally undervalue the severity of these invasions and are unsuccessful to examine potential fraud.

Despite the fact that this risk is at this time restricted to South Korea, scientists caution that there are no specialized limitations preventing these attackers from growing to other locations, such as the European Union.

This new type of vishing attack underscores the regular evolution of prison techniques and their ability to exploit technology for destructive reasons. The team accountable for the “Letscall” malware demonstrates intricate know-how of Android security and voice routing technologies.

Discovered this report interesting? Comply with us on Twitter  and LinkedIn to examine a lot more distinctive information we article.


Some pieces of this posting are sourced from:
thehackernews.com

Previous Post: «another critical unauthenticated sqli flaw discovered in moveit transfer software Another Critical Unauthenticated SQLi Flaw Discovered in MOVEit Transfer Software
Next Post: Two Spyware Apps on Google Play with 1.5 Million Users Sending Data to China two spyware apps on google play with 1.5 million users»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.